• Aucun résultat trouvé

CrimeTelescope: crime hotspot prediction based on urban and social media data fusion

N/A
N/A
Protected

Academic year: 2021

Partager "CrimeTelescope: crime hotspot prediction based on urban and social media data fusion"

Copied!
25
0
0

Texte intégral

(1)

CrimeTelescope: crime hotspot prediction based

on urban and social media data fusion

Dingqi Yang1 · Terence Heaney1· Alberto Tonon1· Leye Wang2· Philippe Cudr´e-Mauroux1

Abstract Crime is a complex social issue impacting a considerable number of individu-als within a society. Preventing and reducing crime is a top priority in many countries. Given limited policing and crime reduction resources, it is often crucial to identify effective strategies to deploy the available resources. Towards this goal, crime hotspot prediction has previously been suggested. Crime hotspot prediction leverages past data in order to identify geographical areas susceptible of hosting crimes in the future. However, most of the exist-ing techniques in crime hotspot prediction solely use historical crime records to identify crime hotspots, while ignoring the predictive power of other data such as urban or social media data. In this paper, we propose CrimeTelescope, a platform that predicts and visu-alizes crime hotspots based on a fusion of different data types. Our platform continuously collects crime data as well as urban and social media data on the Web. It then extracts key features from the collected data based on both statistical and linguistic analysis. Finally, it identifies crime hotspots by leveraging the extracted features, and offers visualizations of the hotspots on an interactive map. Based on real-world data collected from New York City,

 Dingqi Yang Dingqi.Yang@unifr.ch Terence Heaney Terence.Heaney@unifr.ch Alberto Tonon Alberto.Tonon@unifr.ch Leye Wang wly@cse.ust.hk Philippe Cudr´e-Mauroux Philippe.Cudre-Mauroux@unifr.ch

1 eXascale Infolab, Department of Computer Science, University of Fribourg, Bd de Perolles 90,

1700 Fribourg, Switzerland

2 Department of Computer Science and Engineering, Hong Kong University of Science

and Technology, Clear Water Bay, Kowloon, Hong Kong

http://doc.rero.ch

Published in "World Wide Web doi: 10.1007/s11280-017-0515-4, 2017"

which should be cited to refer to this work.

(2)

we show that combining different types of data can effectively improve the crime hotspot prediction accuracy (by up to 5.2%), compared to classical approaches based on

histori-cal crime records only. In addition, we demonstrate the usability of our platform through a System Usability Scale (SUS) survey on a full prototype of CrimeTelescope.

Keywords Crime prediction· Data fusion · Urban open data · Social media

1 Introduction

Crime, in all its facets, has been recognized as an important social problem for public safety. Being able to identify risky places for crime has become an increasing concern for both urban authorities and citizens [35]. On one hand, urban authorities are always interested in the improvement of public safety in urban neighborhoods. Given limited policing and crime reduction resources, it is important to find optimal deployment strategies. On the other hand, crime rate is considered as an essential factor that determines whether or not people move to a new neighborhood or what places should be avoided when traveling [1].

In criminological studies, crime hotspot map is a popular analytical tool to discover and visu-alize the areas of high concentrations of crime (i.e., crime hotspots) [11]. In practice, they are widely used as a basic form of crime prediction, relying on retrospective criminal activity data to identify whether a geographical area is likely to be a crime scene or not [6,11,16]. Such a crime hotspot map would be beneficial not only for urban authorities when taking decisions on where to deploy policing and other crime reduction resources, but also for citizens when examining the public safety in their neighborhoods and in the places they plan to travel. Therefore, it is of critical importance for both urban authorities and citizens to have a crime hotspot map with high predictive ability that accurately reflects the crime risk across places. Currently, existing systems for crime hotspot maps—including both open data portals (such as NYC Open Data1) and systems designed specifically for analyzing criminal activ-ities (such as Crimespotting2, SpotCrime3 and CrimeMapping4)—collect crime data from the local police department and visualize them on an interactive map. However, these sys-tems are built based on historical crime records only, resulting in limited predictive ability for the generated crime hotspot maps. Environmental criminology suggests putting focus of criminological study on environmental factors that can influence criminal activities [8]. Fol-lowing this direction, researchers have been focusing on analyzing the correlations between the aggregated crime activities and various urban socio-economic statistics across different geographical areas (including demographics [6], education [12], unemployment [26], eth-nicity [24] and urban infrastructures [18], etc.), and leveraging such correlations to improve crime hotspot prediction accuracy.

However, the fact that those socio-economic statistics are often not collected in a timely manner prevents the accurate prediction of crime hotspots. For example, demographic data in the United States are mostly collected and reported on a yearly basis5. Given the large

1https://nycopendata.socrata.com/ 2http://stamen.com/work/crimespotting/ 3https://www.spotcrime.com/ 4http://www.crimemapping.com/ 5https://www.census.gov/ces/dataproducts/demographicdata.html

http://doc.rero.ch

(3)

number of floating population in urban areas, such annual demographic data become less effective over time for crime prediction. Fortunately, with the recent popularity of urban Big Data [19], large collections of urban and social media data has become available, which are often accessible in a streaming manner and can be easily maintained up-to-date. More importantly, those data often characterize the urban environment in different aspects. For example, urban elements can be represented by Points of Interests (POIs) [46], such as bars, supermarkets or universities; demographic attributes are often linked to user generated content on social networks such as Twitter [47]. Therefore, such urban and social media data has great potential to improve the accuracy of crime hotspot prediction.

In this paper, we propose CrimeTelescope, a platform that predicts and visualizes crime hotspots based on the fusion of heterogeneous urban and social media data. Specifically, CrimeTelescope is designed to integrate various urban and social media data with histori-cal crime data to provide a high-quality and user-friendly crime hotspot prediction system. To achieve this goal, it first continuously collects historical crime data and two types of urban and social media data including urban infrastructures data and Tweets. Second, it extracts features from the above data by applying statistical and linguistic analysis. Finally, it predicts crime hotspots using classification techniques. In addition, CrimeTelescope is designed with an interactive Web interface to visualize the predicted crime hotspots on a map. Our contributions can be summarized as follows:

– To the best of our knowledge, CrimeTelescope is the first online system predicting crime hotspots using urban and social media data fusion.

– To deliver a higher-quality crime hotspot map, we propose an efficient crime hotspot prediction approach by considering various urban and social media data. Specifically, the proposed approach can extract representative features from various data sources and integrate them for crime hotspot prediction.

– To provide a user-friendly interface to end users, we design a simple yet informative Web interface to visualize the predicted crime hotspots on an interactive map.

– CrimeTelescope is evaluated from both an effectiveness (crime prediction performance) and a system usability perspective. The results show that it can effectively predict crime hotspots and offers excellent usability. Particularly, compared to classical approaches based on historical crime records only, CrimeTelescope is able to improve the prediction accuracy by up to 5.2%.

The rest of the article is organized as follows. Section2presents related work. Sections3

and4illustrate the design of the CrimeTelescope platform and give details on our crime hotspot prediction process, respectively. Section5presents the implemented prototype of CrimeTelescope and its functionalities. Sections6and7present our empirical evaluation, focusing on crime prediction performance and system usability, respectively. We conclude our work in Section8.

2 Related work

As an inevitable and important social problem of our societies, criminal activities have been traditionally studied in different fields, such as sociology [15], psychology [13], and eco-nomics [23]. The recent movements of open data have made large repositories of crime activity data become publicly accessible, which provides an unprecedented opportunity to start studying crime in a more systematic manner. Along with the recent advances in Big Data analytic techniques, we are able to extensively analyze and deeply understand crime

(4)

patterns. In the current literature, researchers have devoted their attention on analyzing crim-inal activities mainly from two different perspectives, i.e., people-centric and place-centric perspectives.

On one hand, studies from a people-centric perspective mainly focus on discovering individual/collective criminal profiles. For example, Wang et al. [39,40] have recently con-ducted a series of work on applying machine learning techniques to detect specific patterns of criminal activities committed by the same offender (or group of offenders). Although the people-centric studies reveal interesting patterns of criminal activity, they often do not consider the environmental or context factors that influence criminal activities, which is the main focus of environmental criminology [8].

On the other hand, studies from a place-centric perspective try to understand the geo-graphical topology of criminal activities. Specifically, it has been widely shown that criminal activities often exhibit complex relationships both in space and time [25, 33]. Against this background, hotspot maps are a popular tool for analyzing and visualizing the distribution of crimes across space and time [11], and are also practically used for crime prediction in order to optimize the deployment of the police and crime reduction resources. For example, real-life experiments have shown that place-centric policing can significantly reduce the violent crime incidents by 23% in Philadelphia [27], 14% in Boston [7] and 33% in Jacksonville [32].

In this paper, we advocate for a place-centric study of crime activities. As suggested by environmental criminology, there is a strong influence on the criminal activities from the corresponding environmental or context factors. Traditionally, researchers have investigated the correlation between criminal activities and various socio-economic factors including demographics [6], education [12], unemployment [26], ethnicity [24] and urban infrastruc-tures [18]. Although such correlation can be leveraged to improve crime prediction, it falls short in rendering an up-to-date crime hotspot map, as those socio-economic statistics are not often collected in a timely manner (often on a yearly basis).

The recent popularity of urban and social media data brings an unprecedented opportu-nity for criminological studies. The advantage lies on that such data can be easily accessible in a realtime manner and, more importantly, on the fact that it is correlated with the crim-inal activities. For example, it has been shown that local crime rate is actually correlated with the surrounding POIs, which can be collected from location based social network [38]; it is also shown that the criminal activities of certain types in a neighborhood are linked to the Tweets posted from there [16]. Motivated by such findings, we study in this paper the problem of crime hotspot prediction based on heterogeneous urban and social media data fusion. Different from the existing work that mainly use single and static datasets, we focus on leveraging data fusion from multiple data sources to develop an online system of crime prediction. Moreover, in addition to the classical quantitative evaluation on crime prediction based on real-world data, we also conduct a system usability scale survey to validate our system.

3 Platform design

In this section, we present the platform design of CrimeTelescope. Figure1shows its system architecture and the end-to-end workflow (from data sources to Web interface). Specifi-cally, CrimeTelescope mainly consists of five parts, viz., Data Collector, Feature Extractor, Crime Predictor and Crime Hotspot Visualizer, as well as a Main Database. First, open crime data and social media data are collected by the Data Collector and get stored in

(5)

Figure 1 System architecture of the CrimeTelescope platform

the Main Database. Second, the Feature Extractor processes and mines the collected urban and social media data to extract features. Third, by merging the extracted features, Crime Predictor learns a classification model for crime prediction, and then stores results in the Main Database. Finally, the Data Visualizer supports a Web based interactive map inter-face for visualizing crime hotspots. In the following, we present the detailed design and characteristics of each component.

3.1 Data collector

The Data Collector is responsible for collecting related urban and social media data from open data portal and social network service providers. As illustrated in Figure1, it is com-posed of several Data Connectors, a Data Crawler, an Access Controller and an Access Token Database. Due to security considerations, most open data portals and social network services have integrated the OAuth protocol6, an open standard for authorization. In order to access the data, an authentication process is required with data-provider-specific access tokens. To achieve this goal, the Access Controller and Access Token Database is imple-mented for authentication with different open data portals and social networks. Moreover, since each individual service provider usually has its own specific Application Programming Interfaces (APIs), the corresponding Data connector is implemented under such specifica-tions. After the authentication, the Data Crawler collects urban and social media data. Such

6http://oauth.net/

(6)

a design of the Data Collector has advantages on its extensibility, i.e., new data sources can be easily incorporated by only implementing the corresponding connectors.

3.2 Feature extractor

The Feature Extractor component is responsible for data preprocessing, analysis and feature extraction. As shown in Figure1, for each specific type of data, it adopts the corresponding processing techniques for feature extraction. Specifically, it uses Kernel Density Estimation on crime data, POI categorization on urban infrastructure data, topic modeling and senti-ment analysis techniques on Tweets. The feature extraction will be presented in more detail below in Section4.

3.3 Crime predictor

The Crime Predictor component is responsible for generating a high-quality crime hotspot map by combining the features extracted from various data sources. Here, we formulate the crime prediction problem as a classification problem, where we aspire to classify whether a given location is a crime scene or not. To achieve this goal, the Crime Predictor merges and rescales the extracted features, and then learns a classification model. The learned model outputs the predicted probability of a given location being a crime scene. Finally, this predicted crime probability is stored in the Main Database.

3.4 Crime hotspot visualizer

The Crime Hotspot Visualizer is responsible for rendering the crime hotspot visualization on an interactive map. As presented in Figure1, it consists of four components. First, the Database Query Interface provides the access to the Main Database. Then, the crime hotspots are visualized based on a heat map, where a control panel is provided with multiple options on both data and visual effects. The data visualization is built upon an interactive map layer, which is implemented using Google Maps API7.

4 Crime hotspot prediction

In this section, we present the crime hotspot prediction process implemented in the CrimeTelescope platform. Specifically, by formulating the crime prediction problem as a classification problem, we combine features extracted from multiple data sources, and then feed them into a classification model to predict the probability of a given location being a crime scene. In the following, we first present an overview of our approach, followed by the data collection and feature extraction, and by the crime prediction process.

4.1 Approach overview

To predict crime from a place-centric perspective, we formulate the following classification task: given a geo-locationl and its feature vector Fl, we train a classification model to

output the probability ofl being a crime scene. Here, the feature vector is extracted from

7https://developers.google.com/maps/

(7)

various social and urban data, which will be presented in Section4.2. In order to construct a training dataset, we consider historical crime incidents as positive samples. However, as historical crime data contains only information about crime incidents, there is no negative sample (i.e., “non-crime incidents” ) available. To solve this problem, we randomly and uniformly generate negative samples from the map as suggested by [16]. More precisely, we sample evenly spaced points, which are not coinciding with the positive samples, and regard these points as negative samples. The sampling granularity actually controls the number of negative samples. In order to avoid getting an imbalanced class distribution (i.e., a biased ratio of positive/negative samples), which brings a serious difficulty to most classification algorithms [31], we tune the sampling granularity such that the number of negative samples is similar to that of positive samples. Subsequently, we train a classification model based on the constructed training data, which can then evaluate the crime probability of any location

l. More information on the prediction method will be given in Section4.3.

4.2 Data collection and feature extraction

In this study, we focus on a use case in New York City (NYC), as its open data portal is well developed. However, our approach and platform are not limited to any specific city. New York City is composed of five boroughs i.e., Manhattan, the Bronx, Queens, Brooklyn, and Staten Island. Figure2shows the map of New York City with its five boroughs. The Data Crawler collects the three types of data (i.e., crime data, urban infrastructure data and Tweet data) within the NYC boundaries.

4.2.1 Crime data

Historical crime records have been regarded as the primary data source for crime prediction [6,11,16]. Many studies in criminology have provided evidence of significant concentra-tion of crime at a geographical level (i.e., crime hotspots), and found that future crimes often occur in the vicinity of those areas [9,16]. Therefore, we collect historical crime data from the NYC open data portal8. It contains incidents of 7 major crime types (i.e., “burglary”, “felony assault”, “grand larceny”, “grand larceny of motor vehicle”, “murder & non-negl manslaughte”, “rape” and “robbery”). Each incident is recorded with detailed information about its time, location (including GPS coordinates) and crime type. As the data is periodi-cally updated on the open data portal, we update our historical crime dataset accordingly. To give a statistical snapshot, 7395 incidents were reported in March 2015. Tables1and2show the related statistics of the crime data in different boroughs and crime types, respectively.

In order to predict crime based on historical data, Kernel Density Estimation (KDE) has been widely adopted to fit a two-dimensional spatial probability density function to historical crime records. The resulted probability density function has a higher value for locations with more offenses close to the selected location point, or a lower value if there are fewer offenses around the selected location point. Such a probability density function indicates the potential risk of crimes at different locations in a city, which was shown as very effective for prediction [11].

In this study, we advocate such a method and consider the fitted probability den-sity estimates as the feature extracted from the historical crime data. Specifically, for a

8https://nycopendata.socrata.com/

(8)

Figure 2 New York City boundary map

given location l = (x, y), (where x and y are latitude and longitude, respectively), the

two-dimensional kernel density estimate [28] is defined as:

ˆ fH(l)= 1 n n  i=1 |H|−1/2K(H−1/2(l− li)) (1)

wheren is the number of crime incidents; H is a bandwidth matrix of size 2× 2; K is

the kernel function. In this study, we selectK as Gaussian kernel, as it has shown a good

performance in estimating hotspots over space [16]. We set the optimal bandwidth matrix

H using Scott’s rule [28], which is a commonly used approach to select the bandwidth:

H = n−1/6cov(x, y) (2)

wherecov(x, y) is the covariance matrix of x and y. Please refer to [28] for more details. Subsequently, we can calculate the density estimate ˆfH(l) and use it as a feature for location

l. We formally denote Fcthe feature extracted from crime data, i.e.,Fc

l = ˆfH(l).

(9)

Table 1 Statistics of crime data

in different boroughs (March 2015 in NYC)

Borough Incident number Percentage

Queens 1,588 21.47%

Brooklyn 2,243 30.33%

Manhattan 1,902 25.72%

Bronx 1,423 19.24%

Staten Island 239 3.23%

4.2.2 Urban infrastructure data

Criminological studies have recognized urban infrastructure as an important factor influ-encing criminal activities. For example, it has been empirically verified that bars/nightclubs hosting social events will increase the probability of disturbances, crime, and violence [5]. In this study, we characterize urban infrastructure using POIs. Specifically, we col-lect POI data in New York City from Foursquare9. Each POI is associated with its name, location and category. We focus on POI categories as they represent urban infrastructure [46] (e.g., bars, museums or colleges). More precisely, Foursquare classifies POIs using a three-level hierarchical category classification10. By March 2015, we collected 67,265 POIs of 9 root categories (i.e. Arts & Entertainment, College & University, Food, Great Out-doors, Nightlife Spot, Professional & Other Places, Residence, Shop & Service, Travel & Transport), which are further classified into 291 categories at the second level. Moreover, a few second-level categories have sub-categories at the third level. We regularly query Foursquare to maintain an up-to-date POI dataset.

To characterize urban infrastructures from POI data, the urban computing community often resorts to the categorical distribution of POIs [45,46]. Motivated by this idea, we also consider the categorical distribution of POIs as the features for crime prediction. Due to the incompleteness of third-level categories, only a few POIs are associated to a third-level category. Therefore, we focus on the categorical distribution of POIs at the first and second levels. Table3shows the overall statistics of POI categories at the first level. As the number of second level POI categories is large (291 categories), we plot a word cloud to visualize their distribution in Figure3.

For the purpose of crime prediction, we need to extract features for a given location

l from its surrounding POIs. Therefore, we first split the NYC territory into small grid

cells, and then regard the categorical distribution of POIs in each cell as the feature of the locations there. Specifically, we generate a grid of cells on a 0.01 latitude by 0.01 longitude resolution. Figure4shows the resulting grid cells. For a given locationl, we first find the

cell that it locates in, and consider the categorical distribution of POIs in that cell as the feature extracted for locationl. We denote such urban infrastructure feature as Flp. Figure5

shows the distribution of the second-level POI categories for two different grid cells. As can be seen, we find obvious differences between the urban infrastructure there. We observe a lot of offices around Wall street, while Time square is surrounded by many restaurants and shops.

9https://foursquare.com/

10https://developer.foursquare.com/categorytree

(10)

Table 2 Statistics of crime data

in different types (March 2015 in NYC)

Crime type Incident number Percentage

Burglary 1,031 13.94%

Felony assault 1,476 19.96%

Grand larceny 3,087 41.74%

Grand larceny of motor vehicle 511 6.91%

Murder & non-negl. manslaughte 23 0.31%

Rape 94 1.27%

Robbery 1,173 15.86%

Table 3 Statistics of POI

categories at first level in NYC POI category POI number Percentage

Arts & entertainment 3,529 5.24%

Shop & service 14,315 21.28%

Food 18,134 26.95%

Nightlife spot 4,111 6.11%

Professional & other places 10,160 15.10%

Travel & transport 6,247 9.28%

Outdoors & recreation 4,581 6.81%

College & university 1,686 2.50%

Residence 4,502 6.69%

Figure 3 Distribution of second-level POI categories in NYC (Plotted as a word cloud. Larger font size

implies higher frequency, and vice versa)

(11)

Figure 4 New York City grid cells (on a 0.01 latitude by 0.01 longitude resolution)

4.2.3 Tweet data

Twitter11users can share a short message with their current location in a realtime manner. Such content has been leveraged in many predictive applications, such as election predic-tion [36], disease spreading forecasting [30] and critical event detection [37]. The essential idea of those work is that the content of Tweets is informative with regard to future events. Following this idea, researchers have recently studied how to use Tweets to tackle the crime prediction problem [16,41]. The basic intuition is that the information encoded by Tweets are somehow correlated with crime rate. For example, it has been empirically verified that social events taking place at nightclubs will increase the probability of disturbances, crime, and violence [5]. Therefore, we also incorporate Tweet data in our platform. We contin-uously collect Tweets in New York City from the Twitter Public Streams12in an online manner. As a statistical snapshot, we collected 750,369 Tweets in March 2015.

We extract two types of features from Tweets, namely topic feature and sentiment fea-ture. The topic feature characterizes what people talk about in an area by a distribution of potential topics, while sentiment feature shows the distribution of sentiment polarity in the area.

For the topic feature, we adopt topic modeling techniques (Latent Dirichlet Allocation (LDA) [4]), which are also used in [16]. The processing workflow is shown in Figure6. First, we perform the language detection to filter out non-English Tweets using the language detection library developed by Cybozu Labs [29]. Second, we aggregate Tweets by mapping them onto grid cells on the map. Here we consider the same grid cells as shown in Figure4.

11https://twitter.com/

12https://dev.twitter.com/streaming/public

(12)

(a)

(b)

Figure 5 Distribution of POI categories in two different grid cells

For each grid cell, we aggregate all Tweets within a certain time period that are reported with a location in that grid cell, and consider the aggregated content as a document. (We will later test different time periods for selecting the optimal one.) Third, we perform a Tweet-specific tokenization from NLTK toolkit [3] on the documents. The advantages of using Tweet-specific tokenization mainly lie on that it preserves emoticons (e.g., “;-)”) in the Tweets. Fourth, we filter out stop words including both common English stop words (e.g., “the”) and our self-defined stop words13(e.g., “new” and “york”). Finally, by considering the documents from all the grid cells as a corpus, we apply Latent Dirichlet Allocation (LDA) [4] to train a topic model. Such a topic model can output a distribution of topics for each grid cell, where each topic is a distribution of words describing the topic. For example, a grid cell around John F. Kennedy airport may have a topic distribution with a high probability on the “airport” topic, which contains keywords such as “gate”, “flight”, “airlines”, “delayed”, “luggage”, etc. In this study, we empirically set the number of topics to 50. By characterizing each grid cell using its distribution on topics, we obtain its topic feature, denoted byFt1

l .

For the sentiment feature, we analyze individual Tweets using text-based sentiment anal-ysis techniques [42]. As shown in Figure6, we first filter out non-English Tweets, and then use the Sentiment140 API [17] to obtain the sentiment polarity for individual Tweets. Sen-timent140 defines three classes of sentiment polarity, i.e., negative, neutral and positive. It classifies each Tweet to one sentiment polarity class using distant supervision. Please refer to [17] for more details. After obtaining the sentiment polarity for individual Tweets, we aggregate the sentiment for each grid cell on the map by empirically computing its distribu-tion on the three sentiment polarity classes. We thus consider such sentiment distribudistribu-tion as sentiment feature, denoted byFt2

l .

Based on the extracted topic and sentiment features, we merge them to obtain the overall feature extracted from TweetsFlt by concatenating them together[Ft1

l , F t2 l ].

4.3 Problem formulation of crime prediction

In this section, we formally define our crime prediction problem. Specifically, the objective of the crime prediction in this paper is to predict if a location will be a crime scene or not,

13Note that the self-defined stop words are iteratively selected. More precisely, analyzing the LDA results

allows us to detect frequent words that do not add any meaning to the documents and include them in the stop word list for another round of LDA training.

(13)

Figure 6 Topic and sentiment feature extraction from Tweets

which is intrinsically a binary classification problem. Given a locationl, following the above

feature extraction process, we can get three sets of featuresFlc,Flp,Flt from crime data, urban infrastructure data and Tweet data, respectively. By concatenating these features, we obtain the concatenated feature vectorFl = [Flc, F

p

l , Flt] for location l. The problem now

is to classify whether a locationl will be a crime scene or not based on the feature vector Fl.

However, two issues need to be solved when defining this problem. First, as a binary classification task requires that the training data contains both positive (i.e., crime scene) data samples and negative (non-crime scene) data samples, we have only historical crime incidents representing positive data samples. Therefore, we need to design an appropriate approach to get the negative samples over space. Second, due to the dynamics of crimi-nal activities, a learned crime prediction model will become less and less effective over time. Therefore, we need to define a mechanism to maintain the effectiveness of our crime prediction model. In the following, we propose two solutions to address these two issues, respectively.

4.3.1 Negative data sampling

In order to get negative samples, we use the sampling method proposed in [16]. Its basic idea is to generate evenly-spaced locations at a certain sampling granularity, and consider those locations that are not coinciding with the positive samples as negative samples. Figure7

shows an example of generating negative samples. Given the positive data samples (loca-tions of crime scenes) shown as green points, we firstly generate evenly-spaced loca(loca-tions with a certain distance interval, and then remove the ones that are coinciding with posi-tive samples, resulting in the negaposi-tive samples shown as red points. The coinciding points are empirically defined as points that are less than 200 meters from any crime scenes. The sampling distance interval actually controls the number of negative samples.

Moreover, in this study, we further consider the crime prediction problem for individual crime types, since existing criminological studies have shown that different crime types

(14)

Figure 7 An example of generating negative data samples (Green points refer to the positive data samples

(crime scenes), while red points refer to the sampled evenly-spaced negative data points)

exhibit different patterns of hotspots [16]. Therefore, we build a training dataset for each crime type. Particularly, as the number of crime incidents varies across different crime types, we tune the sampling distance interval to obtain a balanced number of negative samples, i.e., the number of negative samplesNnegis within[0.8Npos, 1.2Npos], where Nposis the

number of positive samples in the historical crime data.

4.3.2 Update frequency of crime prediction model

To evaluate our crime prediction model, rather than using a cross-validation scheme [6], we put a step forward to directly evaluate on the real future crime data. Specifically, as the cross-validation scheme can remove the fluctuation in the real world data by perform repeated trails on historical data, it fails to evaluate the predictability of the learned model on the future crime incidents. Therefore, to maintain the effectiveness of the learned crime prediction model, we define a testing period in the future in which our model is assumed to be valid. Specifically, assuming the training data is built based on the crime data before timet, we now build the testing data using the same method based on the crime data within

[t, t + ], where  defines the testing period (e.g., one day, one week or one month). Figure8shows the example of defining training and testing data over time. In other words, we consider the crime prediction model trained based on data before timet to be valid only

during[t, t + ], and retrain a new model at t +  for the next testing period. Therefore,  defines the update frequency of our crime prediction model. We will later study the crime prediction performance with different, and empirically select an appropriate updating

frequency.

(15)

Figure 8 Example of building training and testing datasets over time

5 CrimeTelescope prototype

In this section, we present the implemented prototype of CrimeTelescope with particular focus on its user interface. As all the system components and algorithms are running on the back-end, users need a simple yet informative interface to visualize the crime prediction results. Therefore, the user interface should be designed to provide a user-friendly visual-ization of the potential risk of crimes in a city. To achieve this goal, we resort to heat maps to visualize the predicted crime probabilities. As shown in Figure9, the user interface is built on top of Google Maps. The advantage of using heat maps is that the crime hotspots can be easily identified by their color.

A control panel with multiple options is also provided to users for further exploration. First, on the top of the map, users are able to choose a time period (the current week or one past month) for displaying the corresponding crime hotspot maps. Then, on the left panel, users can choose to visualize the predicted hotspot map, or the historical hotspot map (if the corresponding historical crime data is available). To let users investigate the crime hotspots of different crime types, a selector of crime types is also provided. Finally, we provide two

Figure 9 User interface of CrimeTelescope prototype (Accessible online here:http://prediction.heaney.ch/)

(16)

options to customize the visual effects of the hotspot map: “Radius”, which controls the size of the smoothing area to generate the heat map, and “Opacity”, which controls the transparency degree of the heat map layer. The prototype of CrimeTelescope is accessible online14.

6 Evaluation of crime prediction

In this section, we quantitatively evaluate our crime prediction approach based on real-world data. In the following, we first present our experimental setup, including the dataset, base-lines and metrics. We then compare our method with different data fusion schemes. Finally, we discuss the crime prediction results across different crime types and its implications.

6.1 Experimental setup

In order to evaluate our crime prediction approach, we use data collected from Jan. 2014 to Apr. 2015, and perform the crime prediction for each testing period (every day, every

week, every month) in the first four months in 2015. Specifically, we use the crime data, city infrastructure data and Tweets data prior to a test period as training data for prediction. More information on the data collection process can be found in Section4.2.

To validate our approach, we compare it with the following baselines:

KDE. This first baseline is based on a classical crime prediction approach, which is based on historical crime data only [11]. The estimate from KDE is the only feature, i.e.,Flc. In our experiments, we run KDE based on crime data from the previous month or the previous year, which are denoted as (last month) and (last year), respectively. – POI. This baseline uses only the features extracted from urban infrastructure dataFlp

for crime prediction. Here, we focus on the top two levels of POI categories, denoted as (lv1) and (lv2), respectively (see Section4.2).

Tweet. This baseline uses only the features extracted from TweetsFltfor crime predic-tion. Here, we perform the feature extraction based on Tweets observed in 30, 10 or 1 day prior to a testing period, which are denoted as (daily rolling 30), (daily rolling 10) and (daily rolling 1), respectively.

KDE+POI. This baseline merges features extracted from historical crime data and urban infrastructure data for crime prediction, where the estimate from KDE and the distribution of POI categories are aggregated as features, i.e.,[Flc, Flp].

KDE+Tweet. This baseline merges the features extracted from historical crime data and Tweets for crime prediction. The estimate from KDE and the features extracted from Tweets are aggregated as features, i.e.,[Flc, Flt].

KDE+Tweet+POI. Our proposed approach merges the features extracted from the three data sources, i.e., Fl = [Flc, Flt, Flp]. The configuration for individual data

sources will be discussed in the evaluation results.

As we formulate the crime prediction problem as a classification problem, we conduct experiments with popular classification algorithms, including Logistic Regression (LR), Naive Bayes (NB), Support Vector Machine (SVM), neural network (NN), Decision Tree

14http://prediction.heaney.ch/

(17)

(DT), and Random Forests (RF). The hyperparameters for each classifier are empirically tuned using cross-validation to achieve best results. Specifically, we tune the following parameters for individual classifiers. For feature preprocessing, we tune each classifier with/without feature standardization. For training classifiers, we use MATLAB default hyperparameter optimization (if available) for individual classifiers: 1) LR: regularization term strength; 2) NB: data distributions including kernel smoothing density estimation with different smoothing window sizes, normal distribution, multinomial distribution, mul-tivariate multinomial distribution; 3) SVM: box constraint penalizing margin-violating observations, and kernel scale parameter; 4) NN: hidden layer size; 5) DT: minimum number of leaf node observations; 6) RF: number of trees. To evaluate classification perfor-mance, we use three common metrics, i.e., accuracy, F1 score and Area Under Curve (AUC) [22]. Higher values of these metrics imply better performance. Note that as the focus of this paper is on data fusion rather than classification algorithms, we report only the best results from individual classifiers.

6.2 Comparison between different data fusion schemes

In this section, we compare the overall crime prediction results of different data fusion schemes. The testing period is set to one week, and we compute the average results of all

test periods in the first four months in 2015. As mentioned previously, we built one model for each crime type, and perform predictions using the corresponding model. The reported results are then the weighted average of all crime types, where the weights are the ratio of individual crime types in the testing data. Figure10shows the results of comparing different data fusion schemes with different metrics and classification algorithms.

First, we observe that models based on features extracted from single data source show unsatisfied results over all classification methods, compared to data fusion methods. When comparing results using individual data sources (KDE, POI or Tweet), we find that historical crime data (i.e., KDE) results in the best performance in general, which indicates that the historical crime data is indeed the primary data source for crime prediction [6,11,16]. We now discuss the different settings for individual data sources. When comparing the two configurations for KDE, we find that the KDE (last year) achieves better performance than KDE (last month). This is probably due to the fact that the historical crime data of one month are sparse, and are not able to accurately reflect the crime hotspots. Comparing the two levels of POI categories, we find that POI (lv2) consistently achieves better results than POI (lv1), as finer-grained POI categories can more subtly characterize urban infrastructure. Comparing the three configurations when adding Tweet data, we find that Tweet (daily rolling 1) generally achieves the best results, followed by (daily rolling 10) and by (daily rolling 30). The results show that the more recent Tweet data have higher predictive power. Hence, we select KDE (last year), POI (lv2) and Tweet (daily rolling 1) in the following experiments.

Second, we find that when fusing KDE with urban infrastructure data (i.e., POI data) or with Tweet data, we always observe improvements on all three metrics over all classifi-cation methods. Furthermore, our approach considering all three data sources consistently outperforms all other baselines. Our results show that the fusion of various urban and social media data is able to improve the overall crime prediction performance. Particularly, compared to the classical KDE method that leverages only the historical crime data, our approach based on data fusion is able to effectively improve the prediction performance. For example, we observe an increase of accuracy by 3.4− 5.2% across different classification

methods.

(18)

(a)

(b)

(c)

(d)

(e)

(f)

Figure 10 Prediction performance comparison between different data fusion schemes

(19)

6.2.1 Implication of different features on the learned model

To further understand the implication of our crime prediction model, we focus on the logistic regression method. Specifically, one key advantage of using a regression model is that the weight assigned to each feature can be interpreted as the contribution of that feature to the prediction result. In our case of crime prediction, such a weight corresponds to the extent that a feature will increase the probability of a location being a crime scene. In order to have a deeper understanding of the crime prediction problem, we investigate such weights in the regression model. Unsurprisingly, we find that the estimates from KDE always have the highest positive weight, which indicates that the historical crime data is indeed the primary data source for crime prediction [6,11,16], i.e., future crimes often occur in the vicinity of areas that had a high concentration of crime activities in the past.

Moreover, we investigate the weights assigned to individual POI categories (at the sec-ond level) by the learned logistic regression model, and find some interesting results. On one hand, the top two POI categories with the highest positive weights are “Argentinian Restaurant” and “Mexican Restaurant”, which implies that the presence (or higher den-sity) of POIs of these two categories will probably lead to a prediction of crime incidents. On the other hand, the top two POI categories with the highest negative weights are “Col-lege Auditorium” and “Col“Col-lege & University”, which implies that the presence (or higher density) of POIs of these two categories will reduce the probability of crime incidents there.

6.3 Performance over time

In this section, we study the crime prediction performance of our approach over time. Specifically, we conduct experiments with different updating frequency, i.e., one day,

one week, one month. In other words, we retrain a new model every day, every week or every month in order to maintain its effectiveness. Similar to the previous experiment, the reported results are the weighted average of all crime types, where the weights are the ratio of individual crime types in the testing data. To better visualize the results, we need to choose a unified granularity over time. As ground truth crime data has a strong fluctuation on a daily granularity, we report the results for each week in the first four months in 2015. More precisely, for the case of being one day, we update the model everyday and

eval-uate it on the next day, and then report the average result for each week. For the case of

 being one month, we update the model every month and evaluate it individually on the

following weeks. We report the results using Random Forests, which shows the best perfor-mance in the previous experiments. We also note that we obtain similar results using other classifiers.

Figure11a, b and c show the accuracy, F1-score and AUC over time, respectively. Since we evaluate our model on the real future crime data, we observe that the weekly results show a certain fluctuation. For a clear comparison with different, we also plot the average

performance over time in Figure11d.

When comparing the results with different update frequency, we observe that frequent

updates can efficiently maintain the effectiveness of the learned crime prediction model. Specifically, comparing the cases of  = one day and  = one month, we observe

similar performance at the beginning of a month (e.g., 1st week). Then, their performance difference increases over time (e.g., 2nd to 4th week), caused by the fact that the model of

= one month become less and less effective over time. Finally, after updating the model

(20)

(a)

(b)

(c)

(d)

Figure 11 Prediction performance over time for different testing periods

at the end of the first month for= one month, its performance increases to the similar

level as for= one day (e.g., 5th week).

In addition, we find similar performance for=one day and =one week, which means

that the learned model can keep its effectiveness within the next week. On the other hand, an update of the model involves all feature extraction process, which is computational expen-sive. Therefore, we empirically set=one week in other experiments to maintain the model

effectiveness.

6.4 Comparison between crime types

Different crime types have been shown to exhibit different hotspot patterns [16]. In this section, we compare the results obtained from different crime types using our approach. As shown in Figure12, we observe different predictabilities across the crime types, which are relatively consistent across different classification algorithms. In order to understand such differences, we further investigate the crime hotspot maps of two types of crimes, i.e., “Rape” with the highest accuracy and “Grand Larceny of Motor Vehicle” with a lower accuracy. As illustrated in Figure13, we observe that the hotspots of crime type “Rape” are fewer and more concentrated than those of “Grand Larceny of Motor Vehicle”. The more concentrated the hotspots are, the higher prediction accuracy we can obtain, as highly concentrated (i.e., less uncertainty over space) crime activities are usually easier to predict. Moreover, such results also motivate us to re-consider the influencing factors for indi-vidual crime types. Specifically, the same factor extracted from urban and social media data may have a different impact on the crime prediction of different crime types. We plan to explore this direction and design type-specific crime prediction approaches in future work.

(21)

(a) (b)

(c) (d)

(e) (f)

Figure 12 Prediction performance comparison between different crime types

7 System usability scale survey

One of the important design goals of CrimeTelescope is to provide a simple yet informa-tive user interface to visualize crime hotspots. Therefore, in order to evaluate our platform from a user experience perspective, we use the System Usability Scale (SUS) survey [10], which is a popular usability evaluation method that has been used to assess various online

(22)

(a)

(b)

Figure 13 Crime hotspot map for two crime types: a Rape; b Grand Larceny of Motor Vehicle

systems, such as clinical decision support systems [34], search engines [14], disaster man-agement systems [43], social network applications [44], etc. This SUS survey contains a questionnaire with ten statements, where participants are supposed to indicate the degree of agreement with each statement according to the Likert Scale [21], i.e., a five-point scale from 1 (“Strongly disagree”) to 5 (“Strongly agree”). The ten statements is organized in the way that the odd-numbered items (1, 3, 5, 7 and 9) are positive statements and the even-numbered ones (2, 4, 6, 8 and 10) are negative statements. Table4shows the statements of the SUS survey.

After the completion of the survey, the results are analyzed as follows. First, a score con-tribution from 0 to 4 is determined for each statement. Specifically, the score concon-tribution of Table 4 System Usability Scale (SUS) survey with the resulted scores

SUS Statements Score

S1: I think that I would like to use this system frequently. 2.77

S2: I found the system unnecessarily complex. 3.58

S3: I thought the system was easy to use. 3.64

S4: I think that I would need the support of a technical person to be able to use this system. 3.58

S5: I found the various functions in this system were well integrated. 3.15

S6: I thought there was too much inconsistency in this system. 3.46

S7: I would imagine that most people would learn to use this system very quickly. 3.62

S8: I found the system very cumbersome to use. 3.46

S9: I felt very confident using the system. 3.30

S10: I need to learn a lot of things before I could get going with this system. 3.58

Learnability dimension (S4 and S7) 3.60

Usability dimension (other 8 statements) 3.37

Overall SUS score 85.35

Note that the scores for S1-S10, learnability and usability range from 0 to 4, while the overall SUS score is between 0 to 100. For all the cases, higher scores imply better user experience

(23)

a positive item is the scale position minus 1, while the score contribution of a negative item is 5 minus the scale position. Subsequently, a higher score for a positive items implies more agreement on its statement, while a higher score for a negative item implies less agreement on its statement. Afterwards, the SUS survey calculates a single score indicating the overall usability of the system. It is computed by multiplying the sum of the score contributions by 2.5 (the overall SUS score is thus between 0 to 100). Higher scores imply better user expe-rience. Furthermore, by conducting factor analysis on the SUS statements, Lewis et al. [20] further define two finer-grained dimensions, i.e., learnability and usability, where the learn-ability dimension contains the statements 4 and 10, and the uslearn-ability dimension contains the statements 1, 2, 3, 5, 6, 7, 8, and 9.

We conducted our survey of CrimeTelescope platform using Google Forms15. The par-ticipants are recruited by emails, websites and social networks. A brief description of our platform is provided to participants. After putting the survey online for three weeks, 26 participants were recruited in total, of which 7 were female. Most of the participants were between 20 and 30 (11 participants) and 30− 40 (9 participants) years old. The participants have diverse professions, including researchers, software/hardware engineers, students, professors, account managers, etc.

The survey results is shown in Table 4 (including scores for individual statements, learnability, usability, and the overall SUS score). First, the overall SUS score is 85.35, cor-responding to an “excellent” SUS rating according the mapping of SUS scores (from 0 to 100) to adjective ratings (i.e, worst imaginable, awful, poor, OK, good, excellent, best imag-inable) [2]. Moreover, our platform achieves high scores for both learnability and usability, of 3.60 and 3.37, respectively. Note that the learnability and usability scores range from 0 to 4, and higher scores imply better user experience.

To better understand the usability of our platform, we further investigate the results of individual statements. We find that S2, S3, S4, S7 and S10 have relatively high scores, while S1 has a low score. On one hand, these high scores indicate that the user interface of CrimeTelescope is well designed and easy to use without further technical support nor specific preliminary knowledge. On the other hand, we find that participants’ agreement on “using the system frequently” is relatively low. By analyzing the comments they left in the survey, we understand that some users are willing to use the system only when necessary, such as when traveling or moving to a new place. Those are very reasonable use cases for citizens; In addition, we believe that CrimeTelescope can serve as a powerful decision support system for urban authorities and police departments.

8 Conclusions and future work

In this paper, we described CrimeTelescope, an online crime prediction and visualiza-tion platform based on urban and social media data fusion. Specifically, CrimeTelescope can continuously collect heterogeneous urban and social media data (i.e., historical crime data, urban infrastructure data and Tweet data), and extract key features from them. By aggregating the extracted features, CrimeTelescope learns a classification model for crime prediction. Finally, it offers a simple yet compelling Web-based user interface for visualiz-ing crime hotspots on an interactive map. To evaluate CrimeTelescope, we first focused on crime prediction accuracy based on real-world data, and then assessed its system usability

15https://docs.google.com/forms

(24)

based on a SUS survey. The results show that CrimeTelescope can achieve accurate crime prediction via data fusion. Particularly, compared to classical approaches based only on his-torical crime data, CrimeTelescope is able to improve the prediction accuracy by up to 5.2%.

The results of the SUS survey show that CrimeTelescope provides a user-friendly interface for crime hotspot visualization.

In the future, we plan to extend CrimeTelescope to incorporate other major cities around the world. Moreover, we intend to include other types of urban and social media data—such as demographics and social event data—to further improve the prediction accuracy. Finally, we also want to explore the temporal dynamics of criminal activities to further provide fine-grained crime hotspot prediction.

Acknowledgments This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement 683253/GraphInt).

References

1. Arulanandam, R., Savarimuthu, B.T.R., Purvis, M.A.: Extracting crime information from online newspa-per articles. In: Proceedings of the second australasian Web conference, pp. 31–38. Australian Computer Society, Inc., Sydney (2014)

2. Bangor, A., Kortum, P., Miller, J.: Determining what individual sus scores mean: adding an adjective rating scale. J. Usability Stud. 4(3), 114–123 (2009)

3. Bird, S., Klein, E., Loper, E.: Natural language processing with Python: analyzing text with the natural language toolkit. O’Reilly Media, Inc., Sebastopol (2009)

4. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993–1022 (2003)

5. Block, R.L., Block, C.R.: Space, place and crime: hot spot areas and hot places of liquor-related crime. Crime and place 4(2), 145–184 (1995)

6. Bogomolov, A., Lepri, B., Staiano, J., Oliver, N., Pianesi, F., Pentland, A.: Once upon a crime: towards crime prediction from demographics and mobile data. In: Proceedings of the 16th international conference on multimodal interaction, pp. 427–434. ACM, New York (2014)

7. Braga, A.A., Hureau, D.M., Papachristos, A.V.: An ex post facto evaluation framework for place-based police interventions. Eval. Rev. 35(6), 592–626 (2011)

8. Brantingham, P.J., Brantingham, P.L.: Environmental criminology. Sage Publications, Beverly Hills (1981)

9. Brantingham, P.L., Brantingham, P.J.: A theoretical model of crime hot spot generation. Studies on Crime & Crime Prevention (1999)

10. Brooke, J.: Sus-a quick and dirty usability scale. Usability Evaluation in Industry 189, 194 (1996) 11. Chainey, S., Tompson, L., Uhlig, S.: The utility of hotspot mapping for predicting spatial patterns of

crime. Secur. J. 21(1), 4–28 (2008)

12. Ehrlich, I.: On the relation between education and crime. In: Education, income, and human behavior, pp. 313–338. NBER, Massachusetts (1975)

13. Eysenck, H.J.: Crime and personality (Psychology Revivals). Routledge, Abingdon (2013)

14. Ferr´e, S., Hermann, A.: Semantic search: reconciling expressive querying and exploratory search. In: International semantic Web conference, pp. 177–192. Springer, Berlin (2011)

15. Garland, D.: Governmentality’and the problem of crime: foucault, criminology, sociology. Theor. Criminol. 1(2), 173–214 (1997)

16. Gerber, M.S.: Predicting crime using twitter and kernel density estimation. Decis. Support. Syst. 61, 115–125 (2014)

17. Go, A., Bhayani, R., Huang, L.: Twitter sentiment classification using distant supervision. CS224n Project Report, Stanford 1.2009, 12 (2009)

18. Huang, Y.Y., Li, C.T., Jeng, S.K.: Mining location-based social networks for criminal activity prediction. In: Wireless and optical communication conference (WOCC), 2015 24th, pp. 185–189. IEEE, Piscataway (2015)

19. Kitchin, R.: The real-time city? big data and smart urbanism. GeoJournal 79(1), 1–14 (2014)

(25)

20. Lewis, J.R., Sauro, J.: The factor structure of the system usability scale . In: Human centered design, pp. 94–103. Springer, Berlin (2009)

21. Likert, R.: A technique for the measurement of attitudes. Arch. Psychol. 22(140), 1–55 (1932) 22. Ling, C.X., Huang, J., Zhang, H.: Auc: a better measure than accuracy in comparing learning algorithms.

In: Conference of the canadian society for computational studies of intelligence, pp. 329–341. Springer, Berlin (2003)

23. Lynch, A.K., Rasmussen, D.W.: Measuring the impact of crime on house prices. Appl. Econ. 33(15), 1981–1989 (2001)

24. Mukherjee, S. et al.: Ethnicity and crime. Trends Iss. Crime Crim. Justice 117, 1 (1999)

25. Newton, A., Felson, M.: Crime patterns in time and space: the dynamics of crime opportunities in urban areas. Crime Sci. 4(1), 1–5 (2015)

26. Raphael, S., Winter-Ebmer, R.: Identifying the effect of unemployment on crime. J. Law Econ. 44(1), 259–283 (2001)

27. Ratcliffe, J.H., Taniguchi, T., Groff, E.R., Wood, J.D.: The philadelphia foot patrol experiment: a ran-domized controlled trial of police patrol effectiveness in violent crime hotspots. Criminology 49(3), 795–831 (2011)

28. Scott, D.W.: Multivariate density estimation: theory, practice, and visualization. Wiley, Hoboken (2015)

29. Shuyo, N.: Language detection library for java.http://code.google.com/p/language-detection/(2010)

30. Signorini, A., Segre, A.M., Polgreen, P.M.: The use of twitter to track levels of disease activity and public concern in the us during the influenza a h1n1 pandemic. PloS one 6(5), e19,467 (2011)

31. Sun, Y., Wong, A.K., Kamel, M.S.: Classification of imbalanced data: a review. Int. J. Pattern Recognit. Artif. Intell. 23(04), 687–719 (2009)

32. Taylor, B., Koper, C.S., Woods, D.J.: A randomized controlled trial of different policing strategies at hot spots of violent crime. J. Exp. Criminol. 7(2), 149–181 (2011)

33. Toole, J.L., Eagle, N., Plotkin, J.B.: Spatiotemporal correlations in criminal offense records. ACM Trans. Intell. Syst. Technol. 2(4), 38 (2011)

34. Trafton, J., Martins, S., Michel, M., Lewis, E., Wang, D., Combs, A., Scates, N., Tu, S., Goldstein, M.K.: Evaluation of the acceptability and usability of a decision support system to encourage safe and effective use of opioid therapy for chronic, noncancer pain by primary care providers. Pain Med. 11(4), 575–585 (2010) 35. Traunmueller, M., Quattrone, G., Capra, L.: Mining mobile phone data to investigate urban crime

theories at scale. In: Social informatics, pp. 396–411. Berlin, Springer (2014)

36. Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Election forecasts with twitter: How 140 characters reflect the political landscape. Social Sci. Comput. Rev. 29(4), 402–418 (2011)

37. Vivacqua, A.S., Borges, M.R.: Taking advantage of collective knowledge in emergency response systems. J. Netw. Comput. Appl. 35(1), 189–198 (2012)

38. Wang, H., Kifer, D., Graif, C., Li, Z.: Crime rate inference with big data. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp. 635–644. ACM, New York (2016)

39. Wang, T., Rudin, C., Wagner, D., Sevieri, R.: Learning to detect patterns of crime. In: Machine learning and knowledge discovery in databases, pp. 515–530. Springer, Berlin (2013)

40. Wang, T., Rudin, C., Wagner, D., Sevieri, R.: Finding patterns with a rotten core: data mining for crime series with cores. Big Data 3(1), 3–21 (2015)

41. Wang, X., Gerber, M.S., Brown, D.E.: Automatic crime prediction using events extracted from twitter posts. In: International conference on social computing, behavioral-cultural modeling, and prediction, pp. 231–238. Springer, Berlin (2012)

42. Yang, D., Zhang, D., Yu, Z., Wang, Z.: A sentiment-enhanced personalized location recommendation system. In: Proceedings of the 24th ACM conference on hypertext and social media, pp. 119–128 (2013) 43. Yang, D., Zhang, D., Frank, K., Robertson, P., Jennings, E., Roddy, M., Lichtenstern, M.: Providing real-time assistance in disaster relief by leveraging crowdsourcing power. Pers. Ubiquit. Comput. 18(8), 2025–2034 (2014)

44. Yang, D., Zhang, D., Chen, L., Qu, B.: Nationtelescope: monitoring and visualizing large-scale collective behavior in lbsns. J. Netw. Comput. Appl. 55, 170–180 (2015)

45. Yang, D., Zhang, D., Qu, B.: Participatory cultural mapping based on collective behavior data in location-based social networks. ACM Trans. Intell. Syst. Technol. (TIST) 7(3), 30 (2016)

46. Yuan, J., Zheng, Y., Xie, X.: Discovering regions of different functions in a city using human mobility and pois. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 186–194. ACM, New York (2012)

47. Zhong, Y., Yuan, N.J., Zhong, W., Zhang, F., Xie, X.: You are where you go: Inferring demographic attributes from location check-ins. In: Proceedings of the 8th ACM international conference on Web search and data mining, pp. 295–304. ACM, New York (2015)

Figure

Figure 1 System architecture of the CrimeTelescope platform
Figure 2 New York City boundary map
Table 1 Statistics of crime data in different boroughs (March 2015 in NYC)
Figure 3 Distribution of second-level POI categories in NYC (Plotted as a word cloud. Larger font size implies higher frequency, and vice versa)
+7

Références

Documents relatifs

Building an Integrated Set of Data Sets Relating to Crime, Criminal Justice and Social Attitudes In order to explore these questions in more detail, we have created a series of data

We evaluate the practical predictability of several predictors in the real-world prediction of mobile data traffic volumes generated by the users of the set U 1..

In this work we attempt to attain an effective ranking by merging search results generated by multiple query variants of the same information need using data fusion techniques..

This PhD research aims to find and evaluate spatial relationships between crime occurrences and nearby social media activity for events areas and estimating the possible influence

In the city of Andahuaylas Peru, agricul- tural region, the conditions of the weather and especially the temperature is decisive for the success or failure of

When an OBDM is available in an organization, an obvious way to proceed to Open Data publication is as follows: (i) express the dataset to be published in terms of a SPARQL query

For example, if the max number of splits that is specified is 7 for a particular branch of the decision tree then the decision tree will stop inducing additional splits

Towards an active involvement of users in the source selection process, we implemented a contextualization engine and integrated it in a system offering two services: source